21. Cryptography: Hash Functions
MIT 6.046J Design and Analysis of Algorithms, Spring 2015
View the complete course: http://ocw.mit.edu/6-046JS15
Instructor: Srinivas Devadas
In this lecture, Professor Devadas covers the basics of cryptography, including desirable properties of cryptographic functions, and their applications to security.
License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu
Видео 21. Cryptography: Hash Functions канала MIT OpenCourseWare
View the complete course: http://ocw.mit.edu/6-046JS15
Instructor: Srinivas Devadas
In this lecture, Professor Devadas covers the basics of cryptography, including desirable properties of cryptographic functions, and their applications to security.
License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu
Видео 21. Cryptography: Hash Functions канала MIT OpenCourseWare
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Introduction to Basic Cryptography: HashingBut how does bitcoin actually work?22. Cryptography: Encryption8. Hashing with ChainingSHA: Secure Hashing Algorithm - ComputerphileElliptic Curve Cryptography Overview1. Introduction, Threat ModelsHow Does SHA-1 Work - Intro to Cryptographic Hash Functions and SHA-1Applied Cryptography: Hash Functions - Part 1Hash Tables and Hash FunctionsLecture 20: Hash Functions by Christof PaarNETWORK SECURITY - SHA 512 (AUTHENTICATION ALGORITHM)Lecture 1: Introduction to Cryptography by Christof Paar10. Open Addressing, Cryptographic HashingHashing Algorithms and Security - ComputerphileLecture 21: SHA-1 Hash Function by Christof PaarP vs. NP and the Computational Complexity ZooHow hash function work?Passwords & hash functions (Simply Explained)